Verifying cloud service-level agreement by a third-party auditor

نویسندگان

  • Hongli Zhang
  • Lin Ye
  • Jiantao Shi
  • Xiaojiang Du
  • Mohsen Guizani
چکیده

In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users with elastic computing and storage resources in a pay-as-you-go way. An SLA between the cloud and a user is a contract that specifies the computing resources and performances that the cloud should provide to the user. A cloud service provider (CSP) has incentives to cheat on the SLA, for example, providing a user with less central processing unit and memory resources than specified in the SLA, which allows the CSP to support more users and make more profits. A malicious CSP can easily disrupt the existing SLA monitoring/verification techniques by interfering with the monitoring/measurement process. A TPA resolves the trust dilemma between a CSP and its users. Under the TPA framework and the untrusted-cloud threat model, we design two effective testing algorithms that can detect an SLA violation of the virtual machine memory size. Using real experiments, we demonstrate that our algorithms can detect cloud cheating on a virtual machine’s memory size (i.e., SLA violations). Furthermore, we show that our testing algorithms can defend various attacks from a malicious CSP, which tries to hide an SLA violation. Copyright © 2013 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Integrity Using Encryption in Cloud Computing

Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights.[1] Existing protocols with the assistance of a third-party auditor in an exceedingly previous work, Sebe ́et al propose a data integrity verifying protocol that supports information dynamics[2]. During this paper, we adapt Sebe ́e...

متن کامل

A Metadata Verification Scheme for Data Auditing in Cloud Environment

Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is termed as data auditing and the process is...

متن کامل

Simulation of Data Integrity Proof in Cloud Storage

Cloud computing technology enables users and enterprises with various capabilities to store and process their data in either privately owned cloud or on a third-party server in order to make data accessing mechanisms much more easy and reliable. This service releases the burden of huge local data storage and their preservation by outsourcing mass data to the cloud. Apart from reducing the stora...

متن کامل

Cloud Data Security While using Third Party Auditor

In this paper the computing resources in the form of service rather than a utilities and product are provided to users over internet. The corporate world there are huge number of client which is accessing there data and modifying the data. The cloud is a platform where the data owner remotely stores their data in cloud. The goal of cloud computing concept is to secure and protect the data which...

متن کامل

Enhanced data security model for cloud using ECC algorithm and third party auditor

With the invention of cloud, the days of keeping all the documents on the computer’s hardware are gradually coming to an end. Today, people outsource their data at Cloud Service Provider (CSP)[1] who offers huge storage space at low cost. But as the data goes on cloud the user loses his control over the data and seeks for data security. Hence an efficient and effective method is needed to ensur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2014